Sciweavers

759 search results - page 68 / 152
» Creating social networks to improve peer-to-peer networking
Sort
View
COMSIS
2006
100views more  COMSIS 2006»
13 years 7 months ago
Holistic Approach to Wep Protocol in Securing Wireless Network Infrastructure
Constant increase in use of wireless infrastructure networks for business purposes created a need for strong safety mechanisms. This paper describes WEP (Wired Equivalent Privacy) ...
Radomir Prodanovic, Dejan Simic
DSRT
2009
IEEE
14 years 2 months ago
Human Flesh Search Model Incorporating Network Expansion and GOSSIP with Feedback
—With the development of on-line forum technology and the pervasive participation of the public, the Human Flesh Search is becoming an arising phenomenon which makes a great impa...
Bing Wang, Bonan Hou, Yiping Yao, Laibin Yan
CORR
2011
Springer
206views Education» more  CORR 2011»
12 years 11 months ago
A Study of Language Usage Evolution in Open Source Software
: In December of 2010, the new game CityVille achieved 6 million daily active users in just 8 days. Clearly the success of CityVille owes something to the fun gameplay experience i...
Siim Karus, Harald Gall
ATAL
2007
Springer
13 years 11 months ago
On the benefits of cheating by self-interested agents in vehicular networks
As more and more cars are equipped with GPS and Wi-Fi transmitters, it becomes easier to design systems that will allow cars to interact autonomously with each other, e.g., regard...
Raz Lin, Sarit Kraus, Yuval Shavitt
CN
2002
127views more  CN 2002»
13 years 7 months ago
Optimal policy for label switched path setup in MPLS networks
An important aspect in designing a multiprotocol label switching (MPLS) network is to determine an initial topology and to adapt it to the traffic load. A topology change in an MP...
Tricha Anjali, Caterina M. Scoglio, Jaudelice Cava...